beep.sys: Code:
Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.8.13.0 2008.08.14 -
AntiVir 7.8.1.19 2008.08.14 -
Authentium 5.1.0.4 2008.08.14 -
Avast 4.8.1195.0 2008.08.14 -
AVG 8.0.0.161 2008.08.14 -
BitDefender 7.2 2008.08.14 -
CAT-QuickHeal 9.50 2008.08.14 -
ClamAV 0.93.1 2008.08.14 -
DrWeb 4.44.0.09170 2008.08.14 -
eSafe 7.0.17.0 2008.08.14 -
eTrust-Vet 31.6.6032 2008.08.14 -
Ewido 4.0 2008.08.14 -
F-Prot 4.4.4.56 2008.08.14 -
Fortinet 3.14.0.0 2008.08.14 -
GData 2.0.7306.1023 2008.08.14 -
Ikarus T3.1.1.34.0 2008.08.14 -
K7AntiVirus 7.10.413 2008.08.13 -
Kaspersky 7.0.0.125 2008.08.14 -
McAfee 5360 2008.08.13 -
Microsoft 1.3807 2008.08.14 -
NOD32v2 3356 2008.08.14 -
Norman 5.80.02 2008.08.13 -
Panda 9.0.0.4 2008.08.13 -
PCTools 4.4.2.0 2008.08.14 -
Rising 20.57.32.00 2008.08.14 -
Sophos 4.32.0 2008.08.14 -
Sunbelt 3.1.1542.1 2008.08.13 -
Symantec 10 2008.08.14 -
TheHacker 6.3.0.3.046 2008.08.13 -
TrendMicro 8.700.0.1004 2008.08.14 -
ViRobot 2008.8.14.1337 2008.08.14 -
VirusBuster 4.5.11.0 2008.08.14 -
Webwasher-Gateway 6.6.2 2008.08.14 -
weitere Informationen
File size: 4224 bytes
MD5...: da1f27d85e0d1525f6621372e7b685e9
SHA1..: e3d2dc5eb273fa701de8af13b60d6baac7629260
SHA256: 5a81a46a3bdd19dafc6c87d277267a5d44f3a1b5302f2cc1111d84b7bad5610d
SHA512: 8b8a95965ccaf51d578c2dd761abfc750fe464360e8244e5a06c2089586ac6fd
e2989e3ab7cc8b28a034c8c9fdba69c2641730674ca55d172d0d1a3e7e53fa8b
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1066c
timedatestamp.....: 0x3b7d82e5 (Fri Aug 17 20:47:33 2001)
machinetype.......: 0x14c (I386)
( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x300 0x424 0x480 5.77 64f775a399d212649b5b58a280791c2d
.rdata 0x780 0xad 0x100 2.62 0ace5f365131534c66de4137833221ad
INIT 0x880 0x284 0x300 4.44 13a9d0bea8490140305ffa9291acfd99
.rsrc 0xb80 0x3c8 0x400 3.22 9b654fc1759147ff04b147754f347be4
.reloc 0xf80 0x9a 0x100 2.80 5c4742feb834ca0995d1e806fe06cc57
( 2 imports )
> ntoskrnl.exe: MmLockPagableDataSection, KeCancelTimer, MmUnlockPagableImageSection, IoStartNextPacket, KeSetTimer, _allmul, IoStartPacket, KeInitializeEvent, KeInitializeTimer, KeInitializeDpc, IoCreateDevice, RtlInitUnicodeString, IoAcquireCancelSpinLock, KeRemoveDeviceQueue, KeRemoveEntryDeviceQueue, IoReleaseCancelSpinLock, IoDeleteDevice, IofCompleteRequest
> HAL.dll: ExReleaseFastMutex, KfRaiseIrql, KfLowerIrql, HalMakeBeep, ExAcquireFastMutex
( 0 exports )
ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=da1f27d85e0d1525f6621372e7b685e9 RUNMLPL.exe: Code:
AhnLab-V3 2008.8.13.0 2008.08.14 -
AntiVir 7.8.1.19 2008.08.14 -
Authentium 5.1.0.4 2008.08.14 -
Avast 4.8.1195.0 2008.08.14 -
AVG 8.0.0.161 2008.08.14 -
BitDefender 7.2 2008.08.14 -
CAT-QuickHeal 9.50 2008.08.14 -
ClamAV 0.93.1 2008.08.14 -
DrWeb 4.44.0.09170 2008.08.14 -
eSafe 7.0.17.0 2008.08.14 -
eTrust-Vet 31.6.6032 2008.08.14 -
Ewido 4.0 2008.08.14 -
F-Prot 4.4.4.56 2008.08.14 -
F-Secure 7.60.13501.0 2008.08.14 -
Fortinet 3.14.0.0 2008.08.14 -
GData 2.0.7306.1023 2008.08.14 -
Ikarus T3.1.1.34.0 2008.08.14 -
K7AntiVirus 7.10.413 2008.08.13 -
Kaspersky 7.0.0.125 2008.08.14 -
McAfee 5360 2008.08.13 -
Microsoft 1.3807 2008.08.14 -
NOD32v2 3356 2008.08.14 -
Norman 5.80.02 2008.08.13 -
Panda 9.0.0.4 2008.08.13 -
PCTools 4.4.2.0 2008.08.14 -
Prevx1 V2 2008.08.14 -
Rising 20.57.32.00 2008.08.14 -
Sophos 4.32.0 2008.08.14 -
Sunbelt 3.1.1542.1 2008.08.13 -
Symantec 10 2008.08.14 -
TheHacker 6.3.0.3.046 2008.08.13 -
TrendMicro 8.700.0.1004 2008.08.14 -
VBA32 3.12.8.3 2008.08.14 -
ViRobot 2008.8.14.1337 2008.08.14 -
VirusBuster 4.5.11.0 2008.08.14 -
Webwasher-Gateway 6.6.2 2008.08.14 -
weitere Informationen
File size: 40960 bytes
MD5...: f8952d66674683e3763d4ac930d3c3c1
SHA1..: 5b05e47cc21b4ddaf2a18ddf86800f9cb6b6c687
SHA256: eb60a86b360238458679adff55796670a436653d95b9eb1beed4d2feb6a5c23a
SHA512: 79f799322c216024a5dd0670fdfbf64b6228618dd0ac65aa3d138f3a98194ea3
df34aaa1d54c9dab6904405142b3c2694572a37efcabeb8bf0f48c8dc88d8b37
PEiD..: InstallShield 2000
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x401180
timedatestamp.....: 0x4084e430 (Tue Apr 20 08:49:52 2004)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x3f06 0x4000 6.41 893a232d05d6e114e3ebef9ef79c40de
.rdata 0x5000 0x842 0x1000 3.33 e2b1dc12fce1ce74aa2ca289284881a6
.data 0x6000 0x3e38 0x3000 0.54 ad3cafda23ae58fb694e5fb31615cb78
.rsrc 0xa000 0x3a0 0x1000 0.95 143ee03b10b79ad9c1cbf63297646b84
( 1 imports )
> KERNEL32.dll: GetExitCodeProcess, WaitForSingleObject, CreateProcessA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, MultiByteToWideChar, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, WideCharToMultiByte, GetCPInfo, GetACP, GetOEMCP, SetHandleCount, GetStdHandle, GetFileType, HeapDestroy, HeapCreate, VirtualFree, RtlUnwind, WriteFile, GetLastError, SetFilePointer, HeapFree, HeapAlloc, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, VirtualAlloc, GetProcAddress, LoadLibraryA, SetStdHandle, FlushFileBuffers, CloseHandle
( 0 exports )
ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=f8952d66674683e3763d4ac930d3c3c1
Beh71.sys:
Kann niht gesendet werden
"0 Bytes permited"
naecd.sys:
Nicht mehr vorhanden
mm_tray.exe: Code:
AhnLab-V3 2008.8.13.0 2008.08.14 -
AntiVir 7.8.1.19 2008.08.14 -
Authentium 5.1.0.4 2008.08.14 -
Avast 4.8.1195.0 2008.08.14 -
AVG 8.0.0.161 2008.08.14 -
BitDefender 7.2 2008.08.14 -
CAT-QuickHeal 9.50 2008.08.14 -
ClamAV 0.93.1 2008.08.14 -
DrWeb 4.44.0.09170 2008.08.14 -
eSafe 7.0.17.0 2008.08.14 -
eTrust-Vet 31.6.6032 2008.08.14 -
Ewido 4.0 2008.08.14 -
F-Prot 4.4.4.56 2008.08.14 -
F-Secure 7.60.13501.0 2008.08.14 -
Fortinet 3.14.0.0 2008.08.14 -
GData 2.0.7306.1023 2008.08.14 -
Ikarus T3.1.1.34.0 2008.08.14 -
K7AntiVirus 7.10.413 2008.08.13 -
Kaspersky 7.0.0.125 2008.08.14 -
McAfee 5360 2008.08.13 -
Microsoft 1.3807 2008.08.14 -
NOD32v2 3356 2008.08.14 -
Norman 5.80.02 2008.08.13 -
Panda 9.0.0.4 2008.08.13 -
PCTools 4.4.2.0 2008.08.14 -
Prevx1 V2 2008.08.14 -
Rising 20.57.32.00 2008.08.14 -
Sophos 4.32.0 2008.08.14 -
Sunbelt 3.1.1542.1 2008.08.13 -
TheHacker 6.3.0.3.046 2008.08.13 -
TrendMicro 8.700.0.1004 2008.08.14 -
VBA32 3.12.8.3 2008.08.14 -
ViRobot 2008.8.14.1337 2008.08.14 -
VirusBuster 4.5.11.0 2008.08.14 -
Webwasher-Gateway 6.6.2 2008.08.14 -
weitere Informationen
File size: 90112 bytes
MD5...: 9a8e5ba07cba9b2d9991abdb0e2e5a35
SHA1..: 709901bf4f1306f248d96c713e151014e7ba9c6b
SHA256: f0fafa1efb3d28b9670971db264517df0bbbf3e743b65c829a0b812137579505
SHA512: 2cc984284681da97398899ff42c779d5d0e04ba17225b1a0d0795755dd336977
a88b5a84b31ae931c7fde9ff9fb72e190d15d9e4b0c5bded0daeedbe39ca5d80
PEiD..: Armadillo v1.71
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x4095f6
timedatestamp.....: 0x3ce9bb92 (Tue May 21 03:14:26 2002)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x88e4 0x9000 5.87 e4c5f2ebd08bbee4003ac55e6c463c3f
.rdata 0xa000 0x192c 0x2000 4.67 11e2d08244ff543e7cf77aba4c1f7720
.data 0xc000 0x19ac 0x1000 4.47 2229918d31eed059d362a46ddcf41054
.rsrc 0xe000 0x8248 0x9000 2.85 dbbc16f3bc401cfa6507771dc28a45c3
( 9 imports )
> KERNEL32.dll: FreeLibrary, GetProcAddress, SystemTimeToFileTime, GetModuleHandleA, GetSystemTime, SetEnvironmentVariableA, OutputDebugStringA, GetShortPathNameA, LoadLibraryA, FormatMessageA, LocalFree, GetVersionExA, CreateMutexA, GetLastError, ReleaseMutex, CloseHandle, GetEnvironmentVariableA, GlobalAlloc, CreateProcessA, GlobalFree, MultiByteToWideChar, FindResourceExA, LoadResource, WideCharToMultiByte, GetStartupInfoA
> USER32.dll: EnableMenuItem, GetCursorPos, MoveWindow, BringWindowToTop, CheckRadioButton, IsDlgButtonChecked, GetClientRect, GetParent, CharUpperA, LoadImageA, GetDesktopWindow, DestroyWindow, DefWindowProcA, PostQuitMessage, RegisterWindowMessageA, UpdateWindow, LoadIconA, LoadCursorA, RegisterClassExA, LoadAcceleratorsA, GetMessageA, TranslateAcceleratorA, TranslateMessage, DispatchMessageA, GetSysColor, GetSystemMetrics, SetMenuItemInfoA, GetMenuItemCount, GetMenuItemID, InsertMenuA, GetWindowRect, EnableWindow, SetForegroundWindow, TrackPopupMenu, PostMessageA, DestroyMenu, LoadMenuA, GetSubMenu, GetMenuStringA, SetWindowLongA, MessageBeep, CallWindowProcA, DialogBoxParamA, InvertRect, LoadStringA, GetDlgItem, ReleaseDC, ScreenToClient, CreateWindowExA, SendMessageA, ShowWindow, GetDC, SendDlgItemMessageA, EndDialog, KillTimer, SetTimer, MessageBoxA
> GDI32.dll: GetTextMetricsA, DeleteObject, ExtTextOutA, PatBlt, SetBkColor, SetTextColor, SelectObject, CreateFontIndirectA, GetObjectA, GetTextExtentPoint32A, TextOutA, GetStockObject
> comdlg32.dll: GetOpenFileNameA
> ADVAPI32.dll: RegSetValueExA, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegOpenKeyExA, RegCreateKeyA
> SHELL32.dll: Shell_NotifyIconA, ShellExecuteA, DragQueryFileA, DragAcceptFiles, DragFinish
> COMCTL32.dll: InitCommonControlsEx
> MSVCP60.dll: __Split@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@AAEXXZ, _find@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QBEIPBGII@Z, __Eos@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@AAEXI@Z, __Xlen@std@@YAXXZ, __Grow@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@AAE_NI_N@Z, __Xran@std@@YAXXZ, _assign@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@PBGI@Z, __0_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAE@ABV_$allocator@G@1@@Z, _find@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QBEIABV12@I@Z, _replace@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@IIABV12@II@Z, _append@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@PBGI@Z, __Tidy@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@AAEX_N@Z, __Freeze@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@AAEXXZ, _erase@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@II@Z, _append@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@IG@Z, _npos@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@2IB, _resize@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEXI@Z, _assign@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAEAAV12@ABV12@II@Z, __C@_1___Nullstr@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@CAPBGXZ@4GB, _c_str@_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QBEPBGXZ, __1_$basic_string@GU_$char_traits@G@std@@V_$allocator@G@2@@std@@QAE@XZ
> MSVCRT.dll: strcat, sprintf, __getmainargs, _controlfp, __setusermatherr, _initterm, __p__fmode, _mbsnbcpy, _XcptFilter, _acmdln, exit, _exit, free, _except_handler3, strcpy, strlen, localtime, time, __2@YAPAXI@Z, __CxxFrameHandler, wcslen, memset, wcsncpy, _mbscmp, _mbsncmp, fclose, fgetc, fopen, fprintf, __p__commode, _adjust_fdiv, __set_app_type
( 5 exports )
_GetStringFromID@DMMLocalizeDll@@QAEHIPAPAD@Z, _MMJB_MultiByteToWideChar@DMMLocalizeDll@@QAEHPBDHPAGH@Z, _MMJB_WideCharToMultiByte@DMMLocalizeDll@@QAEHPBGHPADH@Z, _uCodePage@_1__MMJB_MultiByteToWideChar@DMMLocalizeDll@@QAEHPBDHPAGH@Z@4IA, _uCodePage@_1__MMJB_WideCharToMultiByte@DMMLocalizeDll@@QAEHPBGHPADH@Z@4IA
mbr-Log:
zeigt nichts auffälliges an, sieht genau so aus, wie du's beschrieben hattest. |